ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Improved topology assumptions for threshold cryptography in mobile ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks - SASN '05
◽
10.1145/1102219.1102228
◽
2005
◽
Cited By ~ 6
Author(s):
Giovanni Di Crescenzo
◽
Renwei Ge
◽
Gonzalo R. Arce
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Threshold Cryptography
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
Securing Mobile Ad Hoc Networks through AntTree Clustering and Threshold Cryptography
2006 International Symposium on Ad Hoc and Ubiquitous Computing
◽
10.1109/isahuc.2006.4290646
◽
2006
◽
Cited By ~ 1
Author(s):
P. Subathra
◽
S. Sivagurunathan
◽
G.S.R. Emil Selvan
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Threshold Cryptography
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Trust Based Threshold Cryptography Key Management for Mobile Ad Hoc Networks
2009 IEEE 70th Vehicular Technology Conference Fall
◽
10.1109/vetecf.2009.5379089
◽
2009
◽
Cited By ~ 1
Author(s):
Hisham Dahshan
◽
James Irvine
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Key Management
◽
Ad Hoc
◽
Threshold Cryptography
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load
Embedded and Ubiquitous Computing – EUC 2005 Workshops - Lecture Notes in Computer Science
◽
10.1007/11596042_93
◽
2005
◽
pp. 905-915
◽
Cited By ~ 3
Author(s):
Hoang Nam Nguyen
◽
Hiroaki Morino
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Key Management
◽
Ad Hoc
◽
Threshold Cryptography
◽
Management Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Key Management Scheme
Download Full-text
The Quest for Optimum Server Location Selection in Mobile Ad Hoc Networks Utilising Threshold Cryptography
2010 Seventh International Conference on Information Technology: New Generations
◽
10.1109/itng.2010.126
◽
2010
◽
Cited By ~ 1
Author(s):
Alastair Nisbet
◽
M.A. Rashid
◽
F. Alam
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Threshold Cryptography
◽
Location Selection
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Threshold cryptography in mobile ad hoc networks under minimal topology and setup assumptions
Ad Hoc Networks
◽
10.1016/j.adhoc.2006.05.006
◽
2007
◽
Vol 5
(1)
◽
pp. 63-75
◽
Cited By ~ 3
Author(s):
Giovanni Di Crescenzo
◽
Renwei Ge
◽
Gonzalo R. Arce
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Threshold Cryptography
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Public String Based Threshold Cryptography (PSTC) for Mobile Ad Hoc Networks (MANET)
2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS)
◽
10.1109/iccons.2018.8663101
◽
2018
◽
Author(s):
Gargi K Chauhan
◽
Saurabh M Patel
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Threshold Cryptography
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
System Models with Threshold Cryptography for Withdrawal of Nodes Certificate in Mobile Ad Hoc Networks
Proceedings of the 2nd International Conference on Data Engineering and Communication Technology - Advances in Intelligent Systems and Computing
◽
10.1007/978-981-13-1610-4_49
◽
2018
◽
pp. 481-497
Author(s):
Priti Swapnil Rathi
◽
Kanika Bhalla
◽
CH. Mallikarjuna Rao
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Threshold Cryptography
◽
System Models
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Threshold Cryptography in Mobile Ad Hoc Networks
Security in Communication Networks - Lecture Notes in Computer Science
◽
10.1007/978-3-540-30598-9_7
◽
2005
◽
pp. 91-104
◽
Cited By ~ 2
Author(s):
Giovanni Di Crescenzo
◽
Gonzalo Arce
◽
Renwei Ge
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Threshold Cryptography
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Novel Source Based Min-Max Battery Cost Routing Protocol for Mobile Ad Hoc Networks
CVR Journal of Science & Technology
◽
10.32377/cvrjst0408
◽
2013
◽
Vol 4
(1)
◽
pp. 41-44
Author(s):
Humaira Nishat
◽
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Routing Protocol
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Challenges in Mobile Ad Hoc Networks: Security Threats and its Solutions
Indian Journal Of Applied Research
◽
10.15373/2249555x/jan2013/29
◽
2011
◽
Vol 3
(1)
◽
pp. 72-74
Author(s):
Dhara N Darji
◽
◽
Nita B Thakkar
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Threats
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close